Securing business operations in an SOA

被引:1
|
作者
de Leusse, Pierre [1 ,2 ]
Brossard, David [1 ]
Georgalas, Nektarios [1 ]
机构
[1] BT Innovate & Design PP13 D, Martlesham Heath IP5 3RE, Suffolk, England
[2] Newcastle Univ Secur Architectures Res, Newcastle Upon Tyne, Tyne & Wear, England
关键词
SOA; message oriented security; access management; federated identity; security governance; SERVICE ORIENTED INFRASTRUCTURE;
D O I
10.1002/sec.188
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to achieve agility and shorter concept-to-market timescales for new products and services, ICT service providers and their corporate customers alike increasingly adopt a collection of technologies, concepts and capabilities which come under the banner of the Service Oriented Architecture (SOA). The Service Oriented Infrastructure (SOI) approach complements SOA by enabling the optimal use of virtualised infrastructure services and resources via the network, and their integration in tailored solutions that meet customer needs and adapt to their growth pattern. In this paper we focus on the business and technological challenges relating to security and service dependability for SOI. In particular the paper studies challenges in the security areas of (i) identity federation, (ii) distributed usage and access management, (iii) context-aware secure messaging, routing and transformation and (iv) SOA security governance. It gathers requirements and it proposes an architecture comprising design patterns and a governance framework that address these challenges. An example case-study presents an implementation of the proposed architecture's SOI security capabilities aiming at the practical validation of the proposed architectural concepts. Copyright (c) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:456 / 485
页数:30
相关论文
共 50 条
  • [1] Securing of Business Information
    Mlynek, Jaroslav
    PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON MATHEMATICAL METHODS IN ECONOMICS 2005, 2005, : 273 - 278
  • [2] Securing online business with SSL
    GeoTrust Europe
    不详
    Netw. Secur., 2006, 3 (10-12):
  • [3] Business Driven SOA Customization
    Mazzoleni, Pietro
    Srivastava, Biplav
    SERVICE-ORIENTED COMPUTING - ICSOC 2008, PROCEEDINGS, 2008, 5364 : 286 - 301
  • [4] Securing Data for Business Telephones
    Tray, Alex
    COMMUNICATIONS OF THE ACM, 2023, 66 (05) : 8 - 9
  • [5] On Securing Atomic Operations in Multicast AODV
    Moamen, Ahmed M. Abdel
    Hamza, Haitham S.
    AD HOC & SENSOR WIRELESS NETWORKS, 2015, 28 (1-2) : 137 - 159
  • [6] This Business of Operations
    Pollock
    PSYCHIATRIC QUARTERLY, 1927, 1 (04) : 510 - 510
  • [7] Securing small business means securing America's economic future
    Watts, JC
    DIE CASTING ENGINEER, 2002, 46 (03): : 13 - 13
  • [8] Increasing business flexibility and SOA adoption through effective SOA governance
    Varadan, R.
    Channabasavaiah, K.
    Simpson, S.
    Holley, K.
    Allam, A.
    IBM SYSTEMS JOURNAL, 2008, 47 (03) : 473 - 488
  • [9] Securing the Core University Business Processes
    Ivanov, Veliko
    Tzaneva, Monika
    Murdjeva, Alexandra
    Kisimov, Valentin
    OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 104 - 116
  • [10] Replication Strategies for Business Objects in SOA
    Ameling, Michael
    Wolf, Bernhard
    Springer, Thomas
    Schill, Alexander
    SOFTWARE AND DATA TECHNOLOGIES, 2011, 50 : 192 - +